登入帳戶  | 訂單查詢  | 購物車/收銀台(0) | 在線留言板  | 付款方式  | 運費計算  | 聯絡我們  | 幫助中心 |  加入書簽
會員登入 新用戶登記
HOME新書上架暢銷書架好書推介特價區會員書架精選月讀2023年度TOP分類瀏覽雜誌 臺灣用戶
品種:超過100萬種各類書籍/音像和精品,正品正價,放心網購,悭钱省心 服務:香港台灣澳門海外 送貨:速遞郵局服務站

新書上架簡體書 繁體書
暢銷書架簡體書 繁體書
好書推介簡體書 繁體書

十月出版:大陸書 台灣書
九月出版:大陸書 台灣書
八月出版:大陸書 台灣書
七月出版:大陸書 台灣書
六月出版:大陸書 台灣書
五月出版:大陸書 台灣書
四月出版:大陸書 台灣書
三月出版:大陸書 台灣書
二月出版:大陸書 台灣書
一月出版:大陸書 台灣書
12月出版:大陸書 台灣書
11月出版:大陸書 台灣書
十月出版:大陸書 台灣書
九月出版:大陸書 台灣書
八月出版:大陸書 台灣書

『簡體書』计算机新技术教程

書城自編碼: 2862741
分類:簡體書→大陸圖書→教材研究生/本科/专科教材
作者: 汤晓兵、徐遵义、 赵洪銮、白彧、袁卫华
國際書號(ISBN): 9787302434108
出版社: 清华大学出版社
出版日期: 2016-07-01
版次: 1 印次: 1
頁數/字數: 192/299000
書度/開本: 16开 釘裝: 平装

售價:HK$ 43.5

我要買

share:

** 我創建的書架 **
未登入.


新書推薦:
认知行为疗法:心理咨询的顶层设计
《 认知行为疗法:心理咨询的顶层设计 》

售價:HK$ 102.4
FANUC工业机器人装调与维修
《 FANUC工业机器人装调与维修 》

售價:HK$ 102.4
吕著中国通史
《 吕著中国通史 》

售價:HK$ 64.4
爱琴海的光芒 : 千年古希腊文明
《 爱琴海的光芒 : 千年古希腊文明 》

售價:HK$ 204.7
不被他人左右:基于阿德勒心理学的无压力工作法
《 不被他人左右:基于阿德勒心理学的无压力工作法 》

售價:HK$ 67.9
SDGSAT-1卫星热红外影像图集
《 SDGSAT-1卫星热红外影像图集 》

售價:HK$ 457.7
股市趋势技术分析(原书第11版)
《 股市趋势技术分析(原书第11版) 》

售價:HK$ 227.7
汉匈战争全史
《 汉匈战争全史 》

售價:HK$ 102.4

 

編輯推薦:
1、取材新颖,专业优势突出,均系信息技术的热点领域,代表*成果和研究方向;
2、涵盖计算机硬、软件范畴,深入浅出,涉及大量常用专用词汇、语法和知识点;
3、每个单元均带有自编练习,围绕主题,形式多样,适合互动,激发读者学习兴趣;
4、通过引入、分析和解决问题的过程,形成完整的学习体系,增强专业英语自学技能;5、内容图文并茂,循序渐进,培养和提高专业英语的阅读、翻译和写作等综合应用能力。
內容簡介:
本书精选和提炼了目前计算机专业领域最新的研究成果和学术进展,内容取材广泛,难易适中,每单元各具特色。通过对文章中专业词汇、语法结构的介绍和分析,为读者将来在信息技术以及相关研究方向的英文资料的阅读、翻译和写作等能力提供了重要的支撑和保证。本书结合作者多年计算机教学和科研中的宝贵经验,以及与国外学术交流的体会总结,在保证本书专业知识领先的同时,更着重体现了内容的实用性和针对性。读者在提高专业英语读、写、译水平的同时,可通过本书及时地跟踪IT领域内的顶尖技术,把握学术上的研究热点,确立未来的学习和科研方向。
本书面向的读者是高校信息技术相关专业的本科生、大专生或是从事软、硬件开发及相关领域的工程技术人员,通过对每个单元中英文文献专题的引入、分析和解决问题的过程,培养和提高读者在专业英语方面的阅读、翻译和写作的综合能力。
目錄
Unit 1HardwareMicrowave Integrated Circuits1
1.1Classification of Microwave Integrated
Circuits1
1.2Microwave Circuits in a Communication
System6
1.3Summary9
1.4New Words and Expressions10
1.5Questions10
1.6Problems12Unit 2SoftwareMicrosoft Project 2013 and
the Project
Management Domain13
2.1History of Project Management13
2.2Exploring Project Management Industry
Standards14
2.2.1Project Management Body of Knowledge
PMBOK14
2.2.2PRINCE218
2.3WBS, Phases and Control Points, Methodologies,
and Life Cycles20
2.3.1Work Breakdown StructureWBS20
2.3.2Managerial Control21
2.3.3Phases and Gates21
2.3.4Methodologies22
2.3.5Life Cycles22
2.4Using Microsoft Project with Methodologies and
Life Cycles22
2.4.1Waterfall Development Process23
2.4.2Iterative Development23
2.4.3Research Project27
2.5Accommodating Teaming Styles27
2.6Consultants Tips28
2.6.1Determine the Approach to Use in
Managing Your Project28
2.6.2Use WBS as a First Step in Project
Definition28
2.6.3Use the 59 Checklist for Planning29
2.7New Words and Expressions29
2.8Questions30
2.9Problems31Unit 3DatabaseNoSQL Databases: An
Overview 32
3.1NoSQL: What does it mean32
3.2Why NoSQL Databases32
3.3Aggregate Data Models33
3.4Distribution Models34
3.5CAP theorem35
3.6Types of NoSQL Databases36
3.6.1KeyValue databases36
3.6.2Document databases37
3.6.3Column family stores38
3.6.4Graph Databases38
3.7Why choose NoSQL database40
3.8Choosing NoSQL database41
3.9Schemaless ramifications41
3.10Conclusion42
3.11New Words and Expressions42
3.12Questions42
3.13Problems45Unit 4ProgrammingWhat Software
Architects Need to
Know About DevOps 46
4.1What Software Architects Need to Know About
DevOps46
4.2Defining DevOps46
4.3DevOps Practices and Architectural Implications48
4.4Organizational Aspects of DevOps50
4.5Implications for Software Architecture:
Microservices51
4.6Summary52
4.7New Words and Expressions53
4.8Questions53
4.9Problems56Unit 5Office ComputingThe Ultimate
Players Guide to
MinecraftXbox Edition: Gathering Resources 57
5.1Introducing the HUD57
5.2Avoiding Getting Lost60
5.3Improving Your Tools61
5.4Chests: Safely Stashing Your Stuff63
5.5Avoiding Monsters64
5.6Hunger Management66
5.7Your Mission: Food, Resources, and
Reconnaissance67
5.7.1Food on the Run68
5.7.2Finding a Building Site70
5.8A Resourceful Guide to the Creative Mode
Inventory72
5.9The Bottom Line74
5.10New Words and Expressions74
5.11Questions75
5.12Problems77Unit 6NetworkingTroubleshooting Methods
for Cisco IP
Networks78
6.1Troubleshooting Principles78
6.2Structured Troubleshooting Approaches81
6.2.1The TopDown Troubleshooting
Approach83
6.2.2The BottomUp Troubleshooting
Approach84
6.2.3The DivideandConquer
Troubleshooting
Approach85
6.2.4The FollowthePath
Troubleshooting
Approach86
6.2.5The CompareConfigurations Troubleshooting
Approach87
6.2.6The SwapComponents Troubleshooting
Approach88
6.3Troubleshooting Example Using Six Different
Approaches89
6.4Summary91
6.5New Words and Expressions91
6.6Questions92
6.7Problems94Unit 7Mobile ApplicationWhats Special about Mobile
Testing? 95
7.1User Expectations96
7.2Mobility and Data Networks97
7.3Mobile Devices98
7.4Mobile Release Cycles100
7.5Mobile Testing Is Software Testing101
7.6Summary102
7.7New Words and Expressions102
7.8Questions103
7.9Problems105Unit 8Web DevelopmentThe Mobile
Commerce Revolution
and the Current State of Mobile106
8.1Americans and Smartphones106
8.2Mobile Around the World109
8.3Mobile Commerce110
8.4Beyond the Numbers110
8.5The Bottom Line113
8.6New Words and Expressions113
8.7Questions114
8.8Problems116Unit 9SecurityInformation Security
Principles of
Success117
9.1Introduction117
9.2Principle 1: There Is No Such Thing As Absolute
Security117
9.3Principle 2: The Three Security Goals Are
Confidentiality, Integrity, and Availability119
9.3.1Integrity Models119
9.3.2Availability Models120
9.4Principle 3: Defense in Depth as Strategy120
9.5Principle 4: When Left on Their Own, People
Tend to Make the Worst Security Decisions122
9.6Principle 5: Computer Security Depends on Two
Types of Requirements: Functional and
Assurance122
9.7Principle 6: Security Through Obscurity Is Not
an Answer123
9.8Principle 7: Security = Risk Management124
9.9Principle 8: The Three Types of Security
Controls Are Preventative, Detective, and
Responsive126
9.10Principle 9: Complexity Is the Enemy of
Security127
9.11Principle 10: Fear, Uncertainty, and Doubt Do
Not Work in Selling Security127
9.12Principle 11: People, Process, and Technology
Are All Needed to Adequately Secure a System
or Facility127
9.13Principle 12: Open Disclosure of Vulnerabilities
Is Good for Security!128
9.14Summary129
9.15New Words and Expressions129
9.16Questions130
9.17Problems131Unit 10Web ServicesDesigning Software
in a Distributed
World132
10.1Visibility at Scale133
10.2The Importance of Simplicity134
10.3Composition134
10.3.1Load Balancer with Multiple Backend
Replicas134
10.3.2Server with Multiple Backends136
10.3.3Server Tree138
10.4Distributed State139
10.5The CAP Principle142
10.5.1Consistency142
10.5.2Availability143
10.5.3Partition Tolerance143
10.6Loosely Coupled Systems145
10.7Speed147
10.8Summary150
10.9New Words and Expressions151
10.10Questions151
10.11Problems153Unit 11Big DataBig Data Computing154
11.1Introduction154
11.2Apache Hadoop Data modelling156
11.3NoSQL Big Data systems157
11.3.1Key Value stores157
11.3.2Document databases157
11.3.3Graph databases158
11.3.4XML databases158
11.3.5Distributed Peer Stores158
11.3.6Object stores159
11.4Definitions of Data Management 159
11.4.1Data management159
11.4.2Big data management BDM160
11.5The State of Big Data Management160
11.6Big Data Tools162
11.6.1Big data tools: Jaspersoft BI Suite162
11.6.2Big data tools: Pentaho Business
Analytics163
11.6.3Big data tools: Karmasphere Studio and
Analyst163
11.6.4Big data tools: Talend Open Studio164
11.6.5Big data tools: Skytree Server164
11.6.6Big data tools: Tableau Desktop and
Server165
11.6.7Big data tools: Splunk165
11.7New Words and Expressions166
11.8Questions166
11.9Problems168Unit 12Cloud ComputingThe Practice of
Cloud
System Administration: Operations in a
Distributed World169
12.1Distributed Systems Operations170
12.1.1SRE versus Traditional Enterprise
IT170
12.1.2Change versus Stability171
12.1.3Defining SRE173
12.1.4Operations at Scale174
12.2Service Life Cycle177
12.2.1Service Launches178
12.2.2Service Decommissioning180
12.3Organizing Strategy for Operational Teams180
12.3.1Team Member Day Types183
12.3.2Other Strategies185
12.4Virtual Office186
12.4.1Communication Mechanisms187
12.4.2Communication Policies187
12.5Summary188
12.6New Words and Expressions189
12.7Questions190
12.8Problems191Answers to Questions193References194

 

 

書城介紹  | 合作申請 | 索要書目  | 新手入門 | 聯絡方式  | 幫助中心 | 找書說明  | 送貨方式 | 付款方式 香港用户  | 台灣用户 | 大陸用户 | 海外用户
megBook.com.hk
Copyright © 2013 - 2024 (香港)大書城有限公司  All Rights Reserved.